Method and apparatus for user authentication based on block chain
A user authentication method performed by an authentication management server constituting a block chain network with a target device may comprise receiving, from the target device, a transaction including authentication information of a user and a unique value of the target device; determining a token of the user stored in a smart contract based on the authentication information; and authenticating the user based on validity information of the token, ownership information of the token, and the transaction.
Latest POSTECH ACADEMY—INDUSTRY FOUNDATION Patents:
- Structural and functional characteristics of yeast-derived polysaccharide inducing Treg cell
- ULTRAHIGH-STRENGTH STEEL SHEET HAVING EXCELLENT YIELD RATIO, AND MANUFACTURING METHOD THEREFOR
- Ultrahigh-strength steel sheet having excellent yield ratio, and manufacturing method therefor
- Transdermal drug delivery patch and manufacturing method thereof
- Sulfur-carbon composite, method for producing same, and lithium secondary battery including same
The present application claims the benefit of priority to Korean Patent Application No. 10-2018-0094457, filed on Aug. 13, 2018 with the Korean Intellectual Property Office (KIPO), the entire contents of which are incorporated herein by reference.
TECHNICAL FIELDThe present disclosure relates to a method and an apparatus for user authentication based on block chain technology, and more specifically, to a method and an apparatus for user authentication based on a non-fungible token generated using a smart contract.
BACKGROUNDIn general, user authentication is performed by verifying a user's identity at a central server and transmitting the corresponding authentication information to the user. The user stores the transmitted authentication information in a smartphone and submits the stored authentication information later to be verified. Here, the authentication information should be basically impossible to duplicate and forgery, and should also be able to support a function that can be delegated to other users.
In the case that the central server delivers the authentication information to the smartphone and stores it, since it is impossible to duplicate the authentication information stored on the smartphone, the authentication information should be reissued when the smartphone is lost or changed, and delegation of the authentication information is impossible in principle. Also, since a signature using a secret key of the central server that issues the authentication information is required to prevent forgery of the authentication information, there is also a problem in that the complexity of the authentication process is increased.
With the recent proliferation of block chain technologies, a method of applying a block chain to user authentication has emerged. In general, a user authentication method using a block chain may store and maintain a public key in a block chain from a pair of a private key and the public key issued to a user by using a public key infrastructure, may generate signature information by using the private key known only to the user, and may authenticate the user by decrypting the signature information using the public key stored in the block chain.
Such the conventional user authentication method using a block chain has a limitation in that various attribute information cannot be configured because only the information based on the public key issued to the user is stored in the block chain. Also, since the public key of the user is stored in the block chain, there is a problem of privacy exposure according to execution of the authentication.
In another conventional method for authenticating a user using a block chain (e.g., Civic), a data proof value of the user is initially stored in the block chain, and then a user authentication control device compares a data proof value received from the user with the data proof value stored in the block chain to process authentication of the user. However, even in such the method, since the authentication process is processed based on data owned by the user, the data can be duplicated, and there is a problem that it is difficult to confirm whether a previous owner deletes the data even when the data is delegated to another user.
SUMMARYExemplary embodiments of the present disclosure provide a method for user authentication based on a block chain.
Also, exemplary embodiments of the present disclosure provide a method for issuing a token for user authentication based on a block chain.
Also, exemplary embodiments of the present disclosure provide an authentication management server for user authentication based on a block chain.
Also, exemplary embodiments of the present disclosure provide an authentication management server for issuing a token for user authentication based on a block chain.
According to exemplary embodiments of the present disclosure, a user authentication method, performed by an authentication management server constituting a block chain network with a target device, may comprise receiving, from the target device, a transaction including authentication information of a user and a unique value of the target device; determining a token of the user stored in a smart contract based on the authentication information; and authenticating the user based on validity information of the token, ownership information of the token, and the transaction.
Here, the authenticating of the user may comprise determining whether the token is valid based on the validity information of the token; and in response to determining that the token is valid, authenticating the user based on the ownership information of the token and the transaction.
The user authentication method may further comprise transmitting a result of authenticating the user to the target device.
The token may include a unique value in the block chain network in which information on the smart contract is issued.
The authentication information may include address information of the smart contract and unique address information of a terminal of the user.
Furthermore, according to exemplary embodiments of the present disclosure, a token issuance method, performed by an authentication management server constituting a block chain network with a user terminal, may comprise receiving, from the user terminal, a transaction including authentication information of a user, parameters for setting attribute values of a token, and token generation request information; determining whether to generate a token of the user based on policy information of the smart contract and the authentication information; and in response to determining to generate the token, generating the token of the user including validity information and ownership information based on the policy information and the transaction, and issuing the generated token to the block chain network.
The token issuance method may further comprise transmitting a result of generating the token to the user terminal.
The token may include a unique value in the block chain network in which information on the smart contract is issued.
The authentication information may include address information of the smart contract and unique address information of the user terminal.
The parameters may include information on a target device authenticated by the user terminal.
Furthermore, according to exemplary embodiments of the present disclosure, an authentication management server performing user authentication by constituting a block chain network with a target device may comprise a processor and a memory storing at least one instruction executable by the processor. Also, when executed by the processor, the at least one instruction may be configured the processor to receive, from the target device, a transaction including authentication information of a user and a unique value of the target device; determine a token of the user stored in a smart contract based on the authentication information; and authenticate the user based on validity information of the token, ownership information of the token, and the transaction.
The at least one instruction may be further configured the processor to determine whether the token is valid based on the validity information of the token; and in response to determining that the token is valid, authenticate the user based on the ownership information of the token and the transaction.
The at least one instruction may be further configured the processor to transmit a result of authenticating the user to the target device.
The token may include a unique value in the block chain network in which information on the smart contract is issued.
The authentication information may include address information of the smart contract and unique address information of a terminal of the user.
Furthermore, according to exemplary embodiments of the present disclosure, an authentication management server performing user authentication by constituting a block chain network with a user terminal may comprise a processor and a memory storing at least one instruction executable by the processor. Also, when executed by the processor, the at least one instruction may be configured the processor to receive, from the user terminal, a transaction including authentication information of a user, parameters for setting attribute values of a token, and token generation request information; determine whether to generate a token of the user based on policy information of the smart contract and the authentication information; and in response to determining to generate the token, generate the token of the user including validity information and ownership information based on the policy information and the transaction, and issue the generated token to the block chain network.
The at least one instruction may be further configured the processor to transmit a result of generating the token to the user terminal.
The token may include a unique value in the block chain network in which information on the smart contract is issued.
The authentication information may include address information of the smart contract and unique address information of the user terminal.
The parameters may include information on a target device authenticated by the user terminal.
According to the exemplary embodiment of the present disclosure, user authentication can be performed using a non-fungible token to provide high security. Also, according to the exemplary embodiments of the present disclosure, transfer of ownership and delegation of the non-fungible token is made possible, so that high security can be maintained and flexible user authentication can be provided. Also, according to the exemplary embodiments of the present disclosure, through the delegation of the token, a block chain can be applied to authentication of a vehicle key and authentication of an entry to a building.
Embodiments of the present disclosure will become more apparent by describing in detail embodiments of the present disclosure with reference to the accompanying drawings, in which:
It should be understood that the above-referenced drawings are not necessarily to scale, presenting a somewhat simplified representation of various preferred features illustrative of the basic principles of the disclosure. The specific design features of the present disclosure, including, for example, specific dimensions, orientations, locations, and shapes, will be determined in part by the particular intended application and use environment.
DETAILED DESCRIPTION OF THE EMBODIMENTSExemplary embodiments of the present disclosure are disclosed herein. However, specific structural and functional details disclosed herein are merely representative for purposes of describing embodiments of the present disclosure, however, embodiments of the present disclosure may be embodied in many alternate forms and should not be construed as limited to embodiments of the present disclosure set forth herein.
Accordingly, while the present disclosure is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that there is no intent to limit the present disclosure to the particular forms disclosed, but on the contrary, the present disclosure is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure. Like numbers refer to like elements throughout the description of the figures.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of the present disclosure. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
It will be understood that when an element is referred to as being “connected” or “coupled” to another element, it can be directly connected or coupled to the other element or intervening elements may be present. In contrast, when an element is referred to as being “directly connected” or “directly coupled” to another element, there are no intervening elements present. Other words used to describe the relationship between elements should be interpreted in a like fashion (i.e., “between” versus “directly between,” “adjacent” versus “directly adjacent,” etc.).
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the present disclosure. As used herein, the singular forms “a,” “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises,” “comprising,” “includes” and/or “including,” when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this present disclosure belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Hereinafter, exemplary embodiments of the present disclosure will be described in greater detail with reference to the accompanying drawings.
User authentication methods using a block chain according to exemplary embodiments of the present disclosure may be classified into a method for issuing a token used for user authentication and a method for authenticating a user using the token, and a detailed description of each method will be described with accompanying drawings.
Referring to
The user terminal may propagate a token generation request transaction including authentication information for the user authentication, parameters for setting attribute values of a token, and token generation request information to the block chain network managed by the authentication management server. As described below, other request transactions such as token verification, token delegation, token ownership sharing, and token ownership transfer may also be propagated to the block chain network.
Here, the authentication information may include at least one of an address value of a smart contract used for the user authentication, a unique address value of the user terminal, and user information, but is not limited thereto. Also, the authentication information and the parameters may be previously embedded in the user terminal, or additionally stored for the user authentication. The user terminal may store and manage a private key used when creating the transaction.
The authentication management server may manage the smart contract in the block chain network according to the transaction propagation of the user terminal. When the token generation request transaction is propagated to the block chain network by the user terminal, the authentication management server may specify or determine the smart contract by using the information included in the transaction, and generate a non-fungible token based on a policy of the smart contract.
The non-fungible token may include a unique value in the block chain network and may further include at least one attribute value. Here, the attribute value(s) may mean information or value(s) set by the parameters in relation to the user authentication, and may include at least one of a valid period, a usage environment, an authentication range, and owner information of the token, but are not limited thereto. The generated token may be dependent on the user according to the attribute value, and stored as a state value in the block chain. After generating and storing the token, the authentication management server may provide the user terminal with information indicating the completion of generating the token. In other words, the authentication management server may issue the token by propagating a block including information on the generated token to the block chain network.
Referring to
First, the user terminal may transmit a unique address value of the user terminal and an address value of the smart contract to the target device. Here, the unique address value of the user terminal may mean a wallet address value of the user, but is not limited thereto. Here, the wallet address value may mean an address value of a wallet that manages virtual currency, etc. that can be used in the block chain network. The user terminal may transmit the unique address value of the user terminal and the address value of the smart contract to the target device by using any one of a wireless communication scheme such as a Quick Response (QR) code, Near Field Communication (NFC), or Bluetooth (Bluetooth). However, the communication scheme is not limited thereto. Here, the unique address value of the user terminal and the address value of the smart contract may be referred to as authentication information, and may be different from the authentication information of
The target device may propagate a transaction including the received authentication information and its own unique value to the block chain network. Here, the target device may directly propagate the transaction to the block chain network, or a back-end server may receive the authentication information and the unique value of the target device from the target device, and propagate the transaction including them to the block chain network. However, the detailed propagation scheme is not limited thereto.
Here, the unique value of the target device may mean additional information that can be used for the user authentication, and may include at least one of a location, a model, and an identification (ID) of the target device, but is not limited thereto.
When the transaction is propagated by the target device, the authentication management server may check validity of a token for the smart contract based on the address value of the smart contract included in the transaction, and verify ownership of the token. That is, the authentication management server may confirm a valid period or an authority based on the attribute value of the token and the propagated transaction, and may perform the user authentication by comparing information on a user having ownership of the token with user information included in the transaction.
When the token is valid and the user authentication is successful as a result of the comparison, the authentication management server may issue a block including the transaction propagated by the target device, connect the block to the block chain, and transmit information indicating the completion of authentication to the target device. On the other hand, when the token is invalid or the user authentication is failed as the result of the comparison, the authentication management server may not issue the block including the transaction propagated by the target device and may transmit information on the authentication failure to the target device. However, the information related to the authentication may not be transmitted to the target device.
In the user authentication method using a token according to an exemplary embodiment of the present disclosure, when the user terminal propagates a request transaction, such as token verification, token delegation, token ownership sharing, transfer of ownership of the token, to the block chain network, the above-described comparison based verification process may be performed.
For example, when the user terminal propagates a token ownership delegation request transaction to the block chain network, the authentication management server may reflect the delegation request transaction and perform verification through comparison between information on a token delegated person and information included in the transaction propagated by the target device.
Referring to
The authentication management unit 310 may manage or store parameters and an address value of a smart contract, and may perform a token issuance or user authentication request by using a unique value of the user terminal or a unique address value of a user wallet which are managed or stored by the wallet management unit 320 to be described later. In addition, the authentication management unit 310 may perform token verification, token delegation, token ownership sharing, token ownership transfer, or the like by using the parameters, the address value of the smart contract, and at least one of the unique value of the user terminal and the unique address value of the user wallet in the wallet management unit 320.
The wallet management unit 320 may manage a private key used for describing or generating a transaction for token verification, token delegation, token ownership sharing, token ownership transfer, or the like, and may manage or store the unique value of the user terminal and the unique address value of the user wallet.
Referring to
Upon receipt of a token generation request transaction propagated by the user terminal, the token generation unit 410 may generate a token of the user based on information included in the token generation request transaction and token policy information. In other words, the token generation unit 410 may determine whether the request conforms to the token policy information of the policy management unit 420 which will be described later, based on the parameters, the authentication information, and the token generation request information included in the token generation request transaction. When the request conforms to the token policy information, a token may be generated. Here, the authentication information may include the unique value of the user terminal or the unique address value of the user wallet.
The policy management unit 420 may manage or store policy information for generating a token, and may update the policy information at regular intervals or whenever there is a change. Here, the policy information may include affiliation information of the user for whom a token is allowed to be generated. It may be possible to determine whether to generate a token by comparing the affiliation information of the user included in the authentication information and the affiliation information included in the policy information, without being limited thereto.
Upon receipt of a transaction including the authentication information of the user terminal and an unique value of a target device, which is propagated by the target device, based on the transaction, the token management unit 430 may perform user authentication on the basis of token verification, token delegation, token ownership sharing, token ownership transfer, or the like. In more detail, when the token management unit 430 receives a transaction for user authentication, the token management unit 430 may verify the validity of the token based on information included in the transaction. When the token management unit 430 determines that the token is valid according to the validation result, the token management unit 430 may authenticate the user by verifying an ownership of the token. In addition, when receiving a transaction such as token delegation and token ownership sharing, the token management unit 430 may modify ownership information of the token by reflecting the corresponding information in the token.
The communication unit may propagate a transaction or a block to a block chain network, and may receive a transaction or a block from the block chain network. In other words, the communication unit may propagate a transaction or a block for information related to user authentication or delegation of a token to the block chain network. Also, the communication unit may transmit information indicating completion of the token generation to the user terminal, and may transmit information on the user authentication result to the target device.
Referring to
The processor 510 may execute at least one instruction stored in the memory 520 and/or the storage device 530. The processor 510 may refer to a central processing unit (CPU), a graphics processing unit (GPU), or a dedicated processor on which the methods according to the present disclosure are performed. The memory 520 and the storage device 530 may be configured of a volatile storage medium and/or a nonvolatile storage medium. For example, the memory 520 may be configured as read only memory (ROM) and/or random access memory (RAM).
The memory 520 may store at least one instruction executable by the processor 510. The at least one instruction may cause the processor to receive, from the target device, a transaction including authentication information of a user and a unique value of the target device; determine a token of the user stored in a smart contract based on the authentication information; and authenticate the user based on validity information of the token, ownership information of the token, and the transaction.
Here, the at least one instruction may further cause the processor to determine whether the token is valid based on the validity information of the token; in response to determining that the token is valid, authenticate the user based on the ownership information of the token and the transaction; and transmit a result of authenticating the user to the target device.
Further, the at least one instruction may further cause the processor to receive, from the user terminal, a transaction including authentication information of a user, parameters for setting attribute values of a token, and token generation request information; determine whether to generate a token of the user based on policy information of the smart contract and the authentication information; and in response to determining to generate the token, generate the token of the user including validity information and ownership information based on the policy information and the transaction, and issue the generated token to the block chain network.
Here, the at least one instruction may further cause the processor to transmit a result of generating the token to the user terminal.
Here, the token may include a unique value in the block chain network in which information on the smart contract is issued, the authentication information may include address information of the smart contract and unique address information of the user terminal, and the parameters may include information on a target device authenticated by the user terminal.
The user terminal and the target device may include at least one processor, a memory, and a storage device like the authentication management server.
Referring to
When an authentication management server receives the transaction propagated by the user terminal, the authentication management server may determine whether to generate a token based on the authentication information and token generation policy information (S630). Here, the token generation policy information may mean policy information managed by a policy management unit of the authentication management server, and the policy information may include information on affiliation information of the user for whom a token is allowed to be generated. Also, the authentication information may include user information including the user affiliation information, or the like, and the authentication management server may compare affiliation information of users for whom a token is allowed to be generated in the policy information with the user affiliation information in the authentication information to determine whether to generate a token.
When it is determined to generate a token, the authentication management server may generate a token based on the received transaction (S640) and may issue the generated token (S650). Here, the token may be stored as a state value in the smart contract, and the token issuance may be performed by propagating a transaction or a block including information on the generated token to the block chain network.
Thereafter, the authentication management server may transmit information on the completion of the token issuance to the user terminal (S660).
Referring to
The target device may generate a transaction including the authentication information received from the user terminal and the unique value of the target device (S720), and may propagate the generated transaction to a block chain network (S730).
An authentication management server may determine the corresponding smart contract and token based on the information included in the transaction propagated by the target device (S740), and determine whether the token is valid based on the information included in the transaction and validity information of the token (S750). When it is determined that the token is valid, the authentication management server may perform user authentication based on ownership information of the token and the information included in the transaction (S760). When the user authentication is successful, the authentication management server may transmit information on the authentication result to the target device (S770). The user may use the target device for which the information on the authentication result is received after performing the user authentication according to the above-described process.
The methods according to the exemplary embodiments of the present disclosure may be implemented as program instructions executable by a variety of computers and recorded on a computer readable medium. The computer readable medium may include a program instruction, a data file, a data structure, or a combination thereof. The program instructions recorded on the computer readable medium may be designed and configured specifically for the present disclosure or can be publicly known and available to those who are skilled in the field of computer software.
Examples of the computer readable medium may include a hardware device such as ROM, RAM, and flash memory, which are specifically configured to store and execute the program instructions. Examples of the program instructions include machine codes made by, for example, a compiler, as well as high-level language codes executable by a computer, using an interpreter. The above exemplary hardware device can be configured to operate as at least one software module in order to perform the embodiments of the present disclosure, and vice versa.
While certain aspects of the present disclosure have been described in the context of an apparatus, it may also represent an explanation according to a corresponding method, wherein the components or apparatuses correspond to the respective steps of the method and the respective features of the steps. Similarly, aspects described in the context of a method may also be represented by features of the corresponding components, items or apparatuses. Some or all of the method steps may be performed by a microprocessor, a programmable computer or a hardware apparatus such as an electronic circuit. In some embodiments, one or more of the most important method steps may be performed by such the apparatus.
In the exemplary embodiments, a programmable logic device (e.g., a field programmable gate array (FPGA)) may be used to perform some or all of the functions of the methods described herein. In the embodiments, the FPGA may operate in conjunction with a microprocessor to perform one of the methods described herein. In general, some of the methods are preferably performed by some hardware device.
While the exemplary embodiments of the present disclosure and their advantages have been described in detail, it should be understood that various changes, substitutions and alterations may be made herein without departing from the scope of the present disclosure.
Claims
1. A user authentication method performed on a block chain network where a target device to be controlled by a user and an authentication management server communicate with each other, the user authentication method comprising:
- propagating, by a user terminal, a token generation request transaction to the block chain network, the token generation request transaction including first authentication information for a user authentication and parameters for setting attribute values of a token;
- generating, by the authentication management server, the token based on a policy of a smart contract;
- propagating, by the target device, an authentication request transaction to the block chain network, the authentication request transaction including second authentication information from the user terminal and a unique value of the target device;
- determining whether the token is valid or not;
- authenticating the user based on validity information of the token, ownership information of the token, and the authentication request transaction when the token is valid; and
- transmitting a result of authenticating the user to the target device to allow the user to control the target device,
- wherein the target device is different from the user terminal, and
- wherein the first authentication information includes at least one of an address value of the smart contract used for the user authentication, a unique address value of the user terminal, and user information.
2. The user authentication method according to claim 1, wherein the token is a non-fungible token.
3. The user authentication method according to claim 1, wherein the token includes a unique value in the block chain network in which information on the smart contract is issued.
4. The user authentication method according to claim 1, wherein the second authentication information includes at least one of the address value of the smart contract used for the user authentication, the unique address value of the user terminal, and the user information.
5. A token issuance and management method performed by an authentication management server on a block chain network comprising:
- receiving, from a user terminal of a user, a token generation request transaction including first authentication information that includes at least one of user information, parameters for setting attribute values of a token, and an address value of a smart contract;
- determining whether to generate a token of the user based on a policy of the smart contract and the user information;
- generating the token of the user including validity information and ownership information based on the policy and the token generation request transaction;
- receiving, from a target device, an authentication request transaction including second authentication information from the user terminal and a unique value of the target device;
- authenticating the user for the target device based on validity information of the token, ownership information of the token, and the authentication request transaction; and
- transmitting a result of generating the token to the user terminal to allow the user to control the target device,
- wherein the target device is different from the user terminal.
6. The token issuance and management method according to claim 5,
- wherein the token is a non-fungible token.
7. The token issuance and management method according to claim 6, wherein the token includes a unique value in the block chain network in which information on the smart contract is issued.
8. The token issuance and management method according to claim 5, wherein the parameters include information on the target device.
9. An authentication management server for performing user authentication based on a block chain network to allow a user to control a target device, the authentication management server comprising:
- a processor; and
- a memory storing at least one instruction executable by the processor,
- wherein when executed by the processor, the processor is configured, by the at least one instruction, to:
- receive, from a user terminal, a token generation request transaction including first authentication information for the user authentication and parameters for setting attribute values of a token, the first authentication information including an address value of a smart contract;
- generate the token based on a policy of the smart contract;
- receive, from the target device, an authentication request transaction including second authentication information of the user from the user terminal and a unique value of the target device;
- determine whether the token is valid or not; and
- authenticate the user based on validity information of the token, ownership information of the token, and the authentication request transaction; and
- transmit a result of authenticating the user to the target device to allow the user to control the target device,
- wherein the target device is different from the user terminal.
10. The authentication management server according to claim 9, wherein the at least one instruction is further configured the processor to:
- determine whether the token is valid based on the validity information of the token; and
- in response to determining that the token is valid, authenticate the user based on the ownership information of the token and the authentication request transaction.
11. The authentication management server according to claim 9, wherein the token includes a unique value in the block chain network in which information on the smart contract is issued.
12. The authentication management server according to claim 9, wherein the first authentication information further includes unique address information of a terminal of the user.
13. An authentication management server performing user authentication by constituting a block chain network with a user terminal, the authentication management server comprising:
- a processor; and
- a memory storing at least one instruction executable by the processor,
- wherein when executed by the processor, the at least one instruction is configured the processor to:
- receive, from the user terminal, a transaction including authentication information of a user, parameters for setting attribute values of a token, and token generation request information, the parameters including information on a target device to be controlled by the user of the user terminal;
- determine whether to generate a token of the user based on a policy of a smart contract and the authentication information including an address value of the smart contract;
- in response to determining to generate the token, generate the token of the user including validity information and ownership information based on the policy and the transaction, and issue the generated token to the block chain network; and
- transmit a result of generating the token to the user terminal.
14. The authentication management server according to claim 13, wherein the token includes a unique value in the block chain network in which information on the smart contract is issued.
15. The authentication management server according to claim 13, wherein the authentication information includes the address value of the smart contract and unique address information of the user terminal.
16. An authentication system on a block chain network, wherein the authentication system includes an authentication management server, a user terminal and a target device, and the authentication management server comprises:
- a processor; and
- a memory storing at least one instruction executable by the processor,
- wherein the processor is configured, by the at least one instruction, to:
- generate a token in response to a request from the user terminal and provide token issuance completion information to the user terminal;
- receive an authentication request transaction including authentication information of a user from the target device and authenticate the user by comparing information of the user having an ownership of the token with user information included in the authentication request transaction; and
- transmit a result of generating the token to the target device to allow the user to control the target device,
- wherein the authentication information includes at least one of an address value of a smart contract used for user authentication, a unique address value of the user terminal, and the user information.
17. The authentication management server according to claim 16, wherein the token is a non-fungible token.
10102526 | October 16, 2018 | Madisetti |
20160180338 | June 23, 2016 | Androulaki |
20160261411 | September 8, 2016 | Yau |
20200007322 | January 2, 2020 | Weldemariam |
20200366484 | November 19, 2020 | So |
20210166221 | June 3, 2021 | Noh |
Type: Grant
Filed: Aug 13, 2019
Date of Patent: Feb 14, 2023
Patent Publication Number: 20200053081
Assignee: POSTECH ACADEMY—INDUSTRY FOUNDATION (Pohang-si)
Inventors: Chan Ik Park (Pohang-si), Jeong Hyeon Ma (Ansan-si)
Primary Examiner: Khoi V Le
Application Number: 16/539,341
International Classification: H04L 9/40 (20220101);